barred BOOL NOT NULL DEFAULT FALSE,
deleted BOOL NOT NULL DEFAULT FALSE
);
-
CREATE INDEX actor_usr_home_ou_idx ON actor.usr (home_ou);
CREATE FUNCTION actor.crypt_pw_insert () RETURNS TRIGGER AS $$
CREATE RULE protect_user_delete AS ON DELETE TO actor.usr DO INSTEAD UPDATE actor.usr SET deleted = TRUE WHERE OLD.id = actor.usr.id;
+INSERT INTO actor.usr (profile, email, passwd, first_given_name, family_name, home_ou, super_user)
+ VALUES (1, 'admin', 'demo123', 'Administrator', 'ShareStuff', 1, TRUE);
+
CREATE TABLE actor.usr_note (
id SERIAL PRIMARY KEY,
usr INT NOT NULL REFERENCES actor.usr ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED,
);
CREATE INDEX actor_org_unit_parent_ou_idx ON actor.org_unit (parent_ou);
+INSERT INTO actor.org_unit (owner,shortname,name) VALUES (1,'SS','ShareStuff');
+
CREATE VIEW actor.org_unit_depth (id, depth) AS
WITH RECURSIVE t(id,depth) AS (
SELECT id, 0 FROM actor.org_unit WHERE parent_ou IS NULL
AFTER UPDATE ON permission.perm_list
FOR EACH ROW EXECUTE PROCEDURE oils_i18n_id_tracking('ppl');
+INSERT INTO permission.perm_list (id,code) VALUES (-1,'EVERYTHING');
+INSERT INTO permission.perm_list (code) VALUES
+('LOGIN'),
+('SHARE');
+
+
CREATE TABLE permission.grp_tree (
id SERIAL PRIMARY KEY,
name TEXT NOT NULL UNIQUE,
);
CREATE INDEX grp_tree_parent_idx ON permission.grp_tree (parent);
+NSERT INTO permission.grp_tree (name, perm_interval, usergroup, application_perm) VALUES
+ ('Users', '3 years', TRUE, 'group_application.user');
+
CREATE TABLE permission.grp_perm_map (
id SERIAL PRIMARY KEY,
grp INT NOT NULL REFERENCES permission.grp_tree (id) ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED,
CONSTRAINT perm_grp_once UNIQUE (grp,perm)
);
+INSERT INTO permission.grp_perm_map (grp,perm,depth) SELECT CURRVAL(permission.grp_tree_id_seq), pl.id, 0 FROM permission.perm_list pl WHERE id > 0;
+
CREATE TABLE permission.usr_perm_map (
id SERIAL PRIMARY KEY,
usr INT NOT NULL REFERENCES actor.usr (id) ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED,
grantable BOOL NOT NULL DEFAULT FALSE,
CONSTRAINT perm_usr_once UNIQUE (usr,perm)
);
+INSERT INTO permission.usr_perm_map (usr,perm,depth) SELECT u.id, -1, 0 FROM actor.usr u WHERE email = 'admin';
CREATE TABLE permission.usr_object_perm_map (
id SERIAL PRIMARY KEY,